ARTICLES

The Privacy Concerns of FaceApp App

FaceApp app is the latest to go viral and also it has also created privacy concerns amongst the users. Read on to know the...

Why More than 805,000 Systems Still Vulnerable to BlueKeep Attacks

According to a report, more than 805,000 systems using older versions of Windows are still vulnerable to BlueKeep vulnerability. Read on to know more... Since...

Why Google Removed Seven Stalker Apps from Play Store

Recently, Google removed seven apps from Google Play Store after cybersecurity vendor found them to be stalkerware. Read on to know more about it... Recently,...

How a Bluetooth Security Flaw Puts iOS and Windows 10 Devices...

Security researchers discovered a bluetooth security flaw in devices running Windows 10 and iOS. Read on to know more about it... A team of Boston...

NEWS

Personal information of 200,000 users of 1111 job bank leaked on...

Source: Cyware | By Ryan Stewart • Hackers gained access to an old server containing job applicants’ personal data which dated back to eight years...

Attackers Compromise Twitter Account of Scotland Yard

Source: Cyware | By Ryan Stewart • The hackers also targeted emails and news pages of the Metropolitan Police Service. • The internal IT infrastructure of...

New Proyecto RAT targets Colombian businesses

Source: Cyware | By Ryan Stewart • Researchers found a spam campaign targeting financial institutions and governmental organizations. • The threat actors behind the campaign use...

RSAC 2019 APJ – Highlights Public & Private Sector Expert Insights

RSA Conference 2019 APJ: Highlights Public and Private Sector Expert Insights, Calls for Stronger Regional Collaborations for Higher Cybersecurity Standards The annual regional Cybersecurity Conference...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...

EVENTS

RSA Conference 2019 – Asia Pacific & Japan

RSA Conference 2019 Asia Pacific & Japan Marina Bay Sands | Singapore 16 – 18 July As the region's leading cybersecurity event, RSA Conference 2019 Asia Pacific...